首页 > 最新文献

2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications最新文献

英文 中文
Evolving spiking neural networks: A novel growth algorithm corrects the teacher 进化的尖峰神经网络:一种新的增长算法纠正了老师
J. Schaffer
Spiking neural networks (SNNs) have generated considerable excitement because of their computational properties, believed to be superior to conventional von Neumann machines, and sharing properties with living brains. Yet progress building these systems has been limited because we lack a design methodology. We present a gene-driven network growth algorithm that enables a genetic algorithm (evolutionary computation) to generate and test SNNs. The genome length for this algorithm grows O(n) where n is the number of neurons; n is also evolved. The genome not only specifies the network topology, but all its parameters as well. In experiments, the algorithm discovered SNNs that effectively produce a robust spike bursting behavior given tonic inputs, an application suitable for central pattern generators. Even though evolution did not include perturbations of the input spike trains, the evolved networks showed remarkable robustness to such perturbations. On a second task, a sequence detector, several related discriminating designs were found, all made “errors” in that they fired when input spikes were simultaneous (i.e. not strictly in sequence), but not when they were out of sequence. They also fired when the sequence was too close for the teacher to have declared they were in sequence. That is, evolution produced these behaviors even though it was not explicitly rewarded for doing so. We are optimistic that this technology might be scaled up to produce robust SNN designs that humans would be hard pressed to produce.
脉冲神经网络(snn)由于其计算特性而引起了相当大的兴奋,被认为优于传统的冯·诺伊曼机器,并且与活体大脑共享特性。然而,由于我们缺乏设计方法,构建这些系统的进展受到了限制。我们提出了一种基因驱动的网络增长算法,该算法使遗传算法(进化计算)能够生成和测试snn。该算法的基因组长度增长O(n),其中n是神经元的数量;N也进化了。基因组不仅指定了网络拓扑结构,而且还指定了其所有参数。在实验中,该算法发现snn在给定强音输入的情况下可以有效地产生鲁棒的尖峰爆发行为,这是一种适用于中心模式发生器的应用。即使进化不包括输入尖峰串的扰动,进化的网络对这种扰动表现出显著的鲁棒性。在第二个任务中,序列检测器,发现了几个相关的判别设计,它们都犯了“错误”,因为它们在输入尖峰同时(即不严格按顺序)时触发,但在它们不按顺序时却不会触发。他们也会在距离太近,以至于老师无法宣布他们是按顺序射击的时候开枪。也就是说,进化产生了这些行为,尽管这样做并没有得到明确的奖励。我们乐观地认为,这项技术可能会扩大规模,生产出人类难以生产的强大SNN设计。
{"title":"Evolving spiking neural networks: A novel growth algorithm corrects the teacher","authors":"J. Schaffer","doi":"10.1109/CISDA.2015.7208630","DOIUrl":"https://doi.org/10.1109/CISDA.2015.7208630","url":null,"abstract":"Spiking neural networks (SNNs) have generated considerable excitement because of their computational properties, believed to be superior to conventional von Neumann machines, and sharing properties with living brains. Yet progress building these systems has been limited because we lack a design methodology. We present a gene-driven network growth algorithm that enables a genetic algorithm (evolutionary computation) to generate and test SNNs. The genome length for this algorithm grows O(n) where n is the number of neurons; n is also evolved. The genome not only specifies the network topology, but all its parameters as well. In experiments, the algorithm discovered SNNs that effectively produce a robust spike bursting behavior given tonic inputs, an application suitable for central pattern generators. Even though evolution did not include perturbations of the input spike trains, the evolved networks showed remarkable robustness to such perturbations. On a second task, a sequence detector, several related discriminating designs were found, all made “errors” in that they fired when input spikes were simultaneous (i.e. not strictly in sequence), but not when they were out of sequence. They also fired when the sequence was too close for the teacher to have declared they were in sequence. That is, evolution produced these behaviors even though it was not explicitly rewarded for doing so. We are optimistic that this technology might be scaled up to produce robust SNN designs that humans would be hard pressed to produce.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"4 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90701231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Local feature analysis for robust face recognition 鲁棒人脸识别的局部特征分析
E. F. Ersi, John K. Tsotsos
In this paper a novel technique for face recognition is proposed. Using the statistical Local Feature Analysis (LFA) technique, a set of feature points is extracted from each face image, at locations with highest deviations from the statistical expected face. Each feature point is described by a set of Gabor wavelet responses at different frequencies and orientations. A triangle-inequality-based pruning algorithm is developed for fast matching, which automatically chooses a set of key features from the database of model features and uses the pre-computed distances of the keys to the database, along with the triangle inequality, in order to speedily compute lower bounds on the distances from a query feature to the database, and eliminate the unnecessary direct comparisons. Our proposed technique achieves perfect results on the ORL face set and an accuracy rate of 99.1% on the FERET face set, which shows the superiority of the proposed technique over all considered state-of-the-art face recognition methods.
本文提出了一种新的人脸识别技术。利用统计局部特征分析(LFA)技术,从每张人脸图像中提取一组特征点,这些特征点位于与统计期望人脸偏差最大的位置。每个特征点由一组不同频率和方向的Gabor小波响应来描述。为了实现快速匹配,提出了一种基于三角不等式的剪枝算法,该算法自动从模型特征库中选择一组关键特征,利用预先计算的关键特征到数据库的距离,结合三角不等式,快速计算查询特征到数据库的距离下界,消除不必要的直接比较。我们提出的技术在ORL人脸集上取得了完美的结果,在FERET人脸集上取得了99.1%的准确率,这表明了我们提出的技术在所有被认为是最先进的人脸识别方法中的优越性。
{"title":"Local feature analysis for robust face recognition","authors":"E. F. Ersi, John K. Tsotsos","doi":"10.1109/CISDA.2009.5356524","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356524","url":null,"abstract":"In this paper a novel technique for face recognition is proposed. Using the statistical Local Feature Analysis (LFA) technique, a set of feature points is extracted from each face image, at locations with highest deviations from the statistical expected face. Each feature point is described by a set of Gabor wavelet responses at different frequencies and orientations. A triangle-inequality-based pruning algorithm is developed for fast matching, which automatically chooses a set of key features from the database of model features and uses the pre-computed distances of the keys to the database, along with the triangle inequality, in order to speedily compute lower bounds on the distances from a query feature to the database, and eliminate the unnecessary direct comparisons. Our proposed technique achieves perfect results on the ORL face set and an accuracy rate of 99.1% on the FERET face set, which shows the superiority of the proposed technique over all considered state-of-the-art face recognition methods.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"102 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74811574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
BlastSim — Multi agent simulation of suicide bombing 多agent模拟自杀式爆炸
Zeeshan-ul-hassan Usmani, F. Alghamdi, D. Kirk
This paper introduces BlastSim — physics based stationary multi-agent simulation of blast waves and its impact on human body. The agents are constrained by physical characteristics and mechanics of blast wave. The simulation is capable of assessing the impact of crowd formation patterns on the magnitude of injury and number of casualties during a suicide bombing attack. It also examines variables such as the number and arrangement of people within a crowd for typical layouts, the number of suicide bombers, and the nature of the explosion including equivalent weight of TNT, and the duration of the resulting blast wave pulse. The paper also explains the physics, explosive models, mathematics and the assumptions we need to create such a simulation. Furthermore, it also describes human shields available in the crowd with partial and full coverage in both two dimensional and three dimensional environments. The goals of this paper are to determine optimal crowd formations to reduce the deaths and/or injuries of individuals in the crowd. The findings, although preliminary, may have implications for forensics investigations, emergency response and counterterrorism.
本文介绍了基于BlastSim - physics的静止多智能体爆炸冲击波仿真及其对人体的影响。药剂受爆炸冲击波的物理特性和力学特性的限制。该模拟能够评估自杀式炸弹袭击中人群形成模式对受伤程度和伤亡人数的影响。它还检查了一些变量,如人群中典型布局的人数和安排,自杀式炸弹袭击者的数量,爆炸的性质,包括TNT的当量,以及由此产生的冲击波脉冲的持续时间。本文还解释了物理、爆炸模型、数学和我们需要创建这样一个模拟的假设。此外,它还描述了在二维和三维环境中部分和完全覆盖人群中的人体盾牌。本文的目标是确定最佳人群编队,以减少人群中个体的死亡和/或伤害。这些发现虽然是初步的,但可能会对法医调查、应急反应和反恐产生影响。
{"title":"BlastSim — Multi agent simulation of suicide bombing","authors":"Zeeshan-ul-hassan Usmani, F. Alghamdi, D. Kirk","doi":"10.1109/CISDA.2009.5356529","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356529","url":null,"abstract":"This paper introduces BlastSim — physics based stationary multi-agent simulation of blast waves and its impact on human body. The agents are constrained by physical characteristics and mechanics of blast wave. The simulation is capable of assessing the impact of crowd formation patterns on the magnitude of injury and number of casualties during a suicide bombing attack. It also examines variables such as the number and arrangement of people within a crowd for typical layouts, the number of suicide bombers, and the nature of the explosion including equivalent weight of TNT, and the duration of the resulting blast wave pulse. The paper also explains the physics, explosive models, mathematics and the assumptions we need to create such a simulation. Furthermore, it also describes human shields available in the crowd with partial and full coverage in both two dimensional and three dimensional environments. The goals of this paper are to determine optimal crowd formations to reduce the deaths and/or injuries of individuals in the crowd. The findings, although preliminary, may have implications for forensics investigations, emergency response and counterterrorism.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"19 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76925118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collaborative architecture for distributed intrusion detection system 分布式入侵检测系统的协同架构
Safaa Zaman, F. Karray
Due to the rapid growth of network technologies and substantial improvement in attack tools and techniques, a distributed Intrusion Detection System (dIDS) is required to allocate multiple IDSs across a network to monitor security events and to collect data. However, dIDS architectures suffer from many limitations such as the lack of a central analyzer and a heavy network load. In this paper, we propose a new architecture for dIDS, called a Collaborative architecture for dIDS (C-dIDS), to overcome these limitations. The C-dIDS contains one-level hierarchy dIDS with a non-central analyzer. To make the detection decision for a specific IDS module in the system, this IDS module needs to collaborate with the IDS in the lower level of the hierarchy. Cooperating with lower level IDS module improves the system accuracy with less network load (just one bit of information). Moreover, by using one hierarchy level, there is no central management and processing of data so there is no chance for a single point of failure. We have examined the feasibility of our dIDS architecture by conducting several experiments using the DARPA dataset. The experimental results indicate that the proposed architecture can deliver satisfactory system performance with less network load.
随着网络技术的飞速发展和攻击工具和技术的不断进步,分布式入侵检测系统(dIDS)需要在网络中分配多个入侵检测系统来监控安全事件和收集数据。然而,dIDS体系结构受到许多限制,例如缺乏中央分析器和繁重的网络负载。在本文中,我们提出了一种新的dIDS体系结构,称为dIDS的协作体系结构(C-dIDS),以克服这些限制。C-dIDS包含带有非中心分析器的一级层次dIDS。为了对系统中的特定IDS模块做出检测决策,该IDS模块需要与层次结构中较低级别的IDS协作。配合底层IDS模块,以更少的网络负载(仅需1位信息)提高系统精度。此外,通过使用一个层次结构级别,不需要对数据进行集中管理和处理,因此不会出现单点故障。通过使用DARPA数据集进行几个实验,我们已经检查了我们的dIDS架构的可行性。实验结果表明,该架构能够在较小的网络负载下提供令人满意的系统性能。
{"title":"Collaborative architecture for distributed intrusion detection system","authors":"Safaa Zaman, F. Karray","doi":"10.1109/CISDA.2009.5356567","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356567","url":null,"abstract":"Due to the rapid growth of network technologies and substantial improvement in attack tools and techniques, a distributed Intrusion Detection System (dIDS) is required to allocate multiple IDSs across a network to monitor security events and to collect data. However, dIDS architectures suffer from many limitations such as the lack of a central analyzer and a heavy network load. In this paper, we propose a new architecture for dIDS, called a Collaborative architecture for dIDS (C-dIDS), to overcome these limitations. The C-dIDS contains one-level hierarchy dIDS with a non-central analyzer. To make the detection decision for a specific IDS module in the system, this IDS module needs to collaborate with the IDS in the lower level of the hierarchy. Cooperating with lower level IDS module improves the system accuracy with less network load (just one bit of information). Moreover, by using one hierarchy level, there is no central management and processing of data so there is no chance for a single point of failure. We have examined the feasibility of our dIDS architecture by conducting several experiments using the DARPA dataset. The experimental results indicate that the proposed architecture can deliver satisfactory system performance with less network load.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"26 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78155713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Robust line extraction based on repeated segment directions on image contours 基于图像轮廓上重复分段方向的鲁棒直线提取
Andrés Solís Montero, A. Nayak, M. Stojmenovic, N. Zaguia
This paper describes a new line segment detection and extraction algorithm for computer vision, image segmentation, and shape recognition applications. This is an important pre processing step in detecting, recognizing and classifying military hardware in images. This algorithm uses a compilation of different image processing steps such as normalization, Gaussian smooth, thresholding, and Laplace edge detection to extract edge contours from colour input images. Contours of each connected component are divided into short segments, which are classified by their orientation into nine discrete categories. Straight lines are recognized as the minimal number of such consecutive short segments with the same direction. This solution gives us a surprisingly more accurate, faster and simpler answer with fewer parameters than the widely used Hough Transform algorithm for detecting lines segments among any orientation and location inside images. Its easy implementation, simplicity, speed, the ability to divide an edge into straight line segments using the actual morphology of objects, inclusion of endpoint information, and the use of the OpenCV library are key features and advantages of this solution procedure. The algorithm was tested on several simple shape images as well as real pictures giving more accuracy than the actual procedures based in Hough Transform. This line detection algorithm is robust to image transformations such as rotation, scaling and translation, and to the selection of parameter values.
本文介绍了一种新的线段检测和提取算法,用于计算机视觉、图像分割和形状识别。这是在图像中检测、识别和分类军事硬件的重要预处理步骤。该算法采用归一化、高斯平滑、阈值分割和拉普拉斯边缘检测等不同的图像处理步骤,从彩色输入图像中提取边缘轮廓。每个连接组件的轮廓被分割成短段,这些短段根据其方向分为九个独立的类别。直线被认为是这种方向相同的连续短段的最小数量。与广泛使用的Hough变换算法相比,该解决方案以更少的参数为我们提供了更准确,更快,更简单的答案,用于检测图像内任何方向和位置的线段。它易于实现,简单,速度快,能够使用对象的实际形态将边缘划分为直线段,包含端点信息,以及使用OpenCV库是该解决过程的主要特点和优势。在几种简单形状图像和真实图像上进行了测试,结果表明该算法比基于霍夫变换的实际算法具有更高的精度。该算法对图像的旋转、缩放、平移等变换和参数值的选择具有较强的鲁棒性。
{"title":"Robust line extraction based on repeated segment directions on image contours","authors":"Andrés Solís Montero, A. Nayak, M. Stojmenovic, N. Zaguia","doi":"10.1109/CISDA.2009.5356556","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356556","url":null,"abstract":"This paper describes a new line segment detection and extraction algorithm for computer vision, image segmentation, and shape recognition applications. This is an important pre processing step in detecting, recognizing and classifying military hardware in images. This algorithm uses a compilation of different image processing steps such as normalization, Gaussian smooth, thresholding, and Laplace edge detection to extract edge contours from colour input images. Contours of each connected component are divided into short segments, which are classified by their orientation into nine discrete categories. Straight lines are recognized as the minimal number of such consecutive short segments with the same direction. This solution gives us a surprisingly more accurate, faster and simpler answer with fewer parameters than the widely used Hough Transform algorithm for detecting lines segments among any orientation and location inside images. Its easy implementation, simplicity, speed, the ability to divide an edge into straight line segments using the actual morphology of objects, inclusion of endpoint information, and the use of the OpenCV library are key features and advantages of this solution procedure. The algorithm was tested on several simple shape images as well as real pictures giving more accuracy than the actual procedures based in Hough Transform. This line detection algorithm is robust to image transformations such as rotation, scaling and translation, and to the selection of parameter values.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"135 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80182994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Integrating reasoning with personality effects in simulated operators 模拟操作者推理与人格效应的整合
R. Guo, B. Cain
Human behaviour representation (HBR) is playing a significant role in Computer-Generated Forces (CGFs). However, current HBR lacks realistic and human-like characteristics, and many domain experts think that integrating personality and individual differences into existing simulation tools in CGFs is able to improve HBR. This article describes an approach to represent reasoning with personality effects in variable cognitive processes in CGFs. By combining the Integrated Performance Modelling Environment (IPME), the proposed representation provides a high level reasoning tool for human behaviour modelling. This approach deals with deterministic and uncertainty reasoning with influence of personality and supports user-defined personality models in simulated military operators. This research shows the possibility to integrate the reasoning with personality effects into performance simulation engines in CGFs for improving current HBR.
人类行为表征(HBR)在计算机生成力(CGFs)中发挥着重要作用。然而,目前的HBR缺乏真实和类人的特征,许多领域专家认为,将人格和个体差异整合到现有的模拟工具中可以改善HBR。本文描述了一种用人格效应来表示cgf中可变认知过程中的推理的方法。通过结合集成性能建模环境(IPME),提出的表示为人类行为建模提供了一个高层次的推理工具。该方法处理了具有人格影响的确定性和不确定性推理,支持用户自定义的模拟军事操作者人格模型。本研究显示了将人格效应推理整合到cgf的性能模拟引擎中以改进当前HBR的可能性。
{"title":"Integrating reasoning with personality effects in simulated operators","authors":"R. Guo, B. Cain","doi":"10.1109/CISDA.2009.5356538","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356538","url":null,"abstract":"Human behaviour representation (HBR) is playing a significant role in Computer-Generated Forces (CGFs). However, current HBR lacks realistic and human-like characteristics, and many domain experts think that integrating personality and individual differences into existing simulation tools in CGFs is able to improve HBR. This article describes an approach to represent reasoning with personality effects in variable cognitive processes in CGFs. By combining the Integrated Performance Modelling Environment (IPME), the proposed representation provides a high level reasoning tool for human behaviour modelling. This approach deals with deterministic and uncertainty reasoning with influence of personality and supports user-defined personality models in simulated military operators. This research shows the possibility to integrate the reasoning with personality effects into performance simulation engines in CGFs for improving current HBR.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"175 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76931186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation data with NetADHICT 基于NetADHICT的1999年DARPA/Lincoln实验室IDS评估数据分析
Carson D. Brown, Alex Cowperthwaite, Abdulrahman Hijazi, Anil Somayaji
The 1999 DARPA/Lincoln Laboratory IDS Evaluation Data has been widely used in the intrusion detection and networking community, even though it is known to have a number of artifacts. Here we show that many of these artifacts, including the lack of damaged or unusual background packets and uniform host distribution, can be easily extracted using NetADHICT, a tool we developed for understanding networks. In addition, using NetADHICT we were able to identify extreme temporal variation in the data, a characteristic that was not identified in past analyses. These results illustrate the utility of NetADHICT in characterizing network traces for experimental purposes.
1999年DARPA/林肯实验室IDS评估数据已被广泛应用于入侵检测和网络社区,尽管它已知有许多工件。在这里,我们展示了许多这些工件,包括缺乏损坏或不寻常的后台数据包和统一的主机分布,可以使用NetADHICT轻松提取,NetADHICT是我们为理解网络而开发的工具。此外,使用NetADHICT,我们能够识别数据中的极端时间变化,这是过去分析中没有发现的特征。这些结果说明了NetADHICT在为实验目的表征网络轨迹方面的效用。
{"title":"Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation data with NetADHICT","authors":"Carson D. Brown, Alex Cowperthwaite, Abdulrahman Hijazi, Anil Somayaji","doi":"10.1109/CISDA.2009.5356522","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356522","url":null,"abstract":"The 1999 DARPA/Lincoln Laboratory IDS Evaluation Data has been widely used in the intrusion detection and networking community, even though it is known to have a number of artifacts. Here we show that many of these artifacts, including the lack of damaged or unusual background packets and uniform host distribution, can be easily extracted using NetADHICT, a tool we developed for understanding networks. In addition, using NetADHICT we were able to identify extreme temporal variation in the data, a characteristic that was not identified in past analyses. These results illustrate the utility of NetADHICT in characterizing network traces for experimental purposes.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"13 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86332874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Goal-driven semi-automated generation of semantic models 目标驱动的半自动化语义模型生成
A. Stirtzinger, C. Anken, B. McQueary
The approach taken with OGEP is to parse relevant domain data in the form of unstructured content (or corpus) and use that knowledge to generate and/or evolve an existing ontology. OGEP creates a constant conversation between the corpus parser and a reasoning mechanism (corpus reasoner) that continually formulates potential ontology modifications in the form of hypotheses. These hypotheses are weighted towards contextual relevancy and further reasoned over to provide a confidence measure for use in deciding new assertions to the ontology. The new assertions generated from the corpus reasoner can either be automatically asserted based on confidence measure, or can be asserted by OGEP interacting with a user for final approval. This paper describes the OGEP technology in the context of the architectural components and identifies a potential technology transition path to Scott AFB's Tanker Airlift Control Center (TACC), which serves as the Air Operations Center (AOC) for the Air Mobility Command (AMC).
OGEP采用的方法是以非结构化内容(或语料库)的形式解析相关领域数据,并使用这些知识来生成和/或发展现有的本体。OGEP在语料库解析器和推理机制(语料库推理器)之间创建一个持续的对话,该机制不断地以假设的形式表述潜在的本体修改。这些假设被加权到上下文相关性,并进一步推理,以提供用于决定对本体的新断言的置信度度量。从语料库推理器生成的新断言既可以基于置信度度量自动断言,也可以通过OGEP与用户交互以获得最终批准来断言。本文描述了OGEP技术在体系结构组件的背景下,并确定了Scott空军基地加油机空运控制中心(TACC)的潜在技术过渡路径,该中心作为空中机动司令部(AMC)的空中作战中心(AOC)。
{"title":"Goal-driven semi-automated generation of semantic models","authors":"A. Stirtzinger, C. Anken, B. McQueary","doi":"10.1109/CISDA.2009.5356518","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356518","url":null,"abstract":"The approach taken with OGEP is to parse relevant domain data in the form of unstructured content (or corpus) and use that knowledge to generate and/or evolve an existing ontology. OGEP creates a constant conversation between the corpus parser and a reasoning mechanism (corpus reasoner) that continually formulates potential ontology modifications in the form of hypotheses. These hypotheses are weighted towards contextual relevancy and further reasoned over to provide a confidence measure for use in deciding new assertions to the ontology. The new assertions generated from the corpus reasoner can either be automatically asserted based on confidence measure, or can be asserted by OGEP interacting with a user for final approval. This paper describes the OGEP technology in the context of the architectural components and identifies a potential technology transition path to Scott AFB's Tanker Airlift Control Center (TACC), which serves as the Air Operations Center (AOC) for the Air Mobility Command (AMC).","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"87 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80778734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Localization of door handle using a single camera on a door opening mobile manipulator 在开门移动机械手上使用单摄像头定位门把手
Dmitri Ignakov, G. Okouneva, Guangjun Liu
This paper presents a novel approach to localizing a door handle of unknown geometry to assist in autonomous door opening. The localization is performed using data from a single CCD camera that is mounted at the end-effector of a mobile manipulator. The proposed algorithm extracts a 3D point cloud using optical flow and known camera motion provided by the manipulator. Segmentation of the point cloud is then performed, enabling the separation of the door and the handle points, which is then followed by fitting a boundary box to the door handle data. The fitted box can then be used to guide robotic grasping. The proposed algorithm has been validated using a 3D virtual scene, and the results have demonstrated the effectiveness of the proposed method to localize a door handle in an unknown environment.
本文提出了一种定位未知几何形状的门把手以辅助自动开门的新方法。定位是使用安装在移动机械手末端执行器上的单个CCD相机的数据进行的。该算法利用机械臂提供的光流和已知的相机运动来提取三维点云。然后对点云进行分割,实现门和把手点的分离,然后对门把手数据进行边界框拟合。安装好的盒子可以用来指导机器人抓取。通过三维虚拟场景验证了该算法的有效性,结果证明了该方法在未知环境中定位门把手的有效性。
{"title":"Localization of door handle using a single camera on a door opening mobile manipulator","authors":"Dmitri Ignakov, G. Okouneva, Guangjun Liu","doi":"10.1109/CISDA.2009.5356543","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356543","url":null,"abstract":"This paper presents a novel approach to localizing a door handle of unknown geometry to assist in autonomous door opening. The localization is performed using data from a single CCD camera that is mounted at the end-effector of a mobile manipulator. The proposed algorithm extracts a 3D point cloud using optical flow and known camera motion provided by the manipulator. Segmentation of the point cloud is then performed, enabling the separation of the door and the handle points, which is then followed by fitting a boundary box to the door handle data. The fitted box can then be used to guide robotic grasping. The proposed algorithm has been validated using a 3D virtual scene, and the results have demonstrated the effectiveness of the proposed method to localize a door handle in an unknown environment.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"13 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81989001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation analysis on destabilization of complex adaptive organizations 复杂自适应组织不稳定性仿真分析
Il-Chul Moon
Many adversarial organizations, such as organized crime groups, terrorist networks, and the like, are complex adaptive organizations. Therefore, strategies against them should consider the natures of complexity and adaptivity. However, such natures create nonlinear effects that are difficult to predict. To mitigate those difficulties, I utilize agent-based simulations that could possibly capture unexpected responses coming from our interventions into their organizations. This paper presents a simulation analysis example of an action against a terrorist group. Particularly, this example points out three critical aspects of simulation analysis. First, this simulation example shows how to setup a simulation analysis to anticipate an intervention's results. Second, this example illustrates various results making analysis useful. Third, this example describes statistical processing of the results. I expect that the three points will advance the current practices of simulation analysis on complex adaptive organizations.
许多对抗性组织,如有组织犯罪集团、恐怖主义网络等,都是复杂的适应性组织。因此,针对它们的策略应该考虑复杂性和适应性的本质。然而,这种性质造成了难以预测的非线性效应。为了减轻这些困难,我利用了基于代理的模拟,这些模拟可能会捕获来自我们对其组织的干预的意外反应。本文给出了一个针对恐怖组织行动的仿真分析实例。特别地,这个例子指出了仿真分析的三个关键方面。首先,这个模拟示例展示了如何设置模拟分析来预测干预的结果。其次,这个例子说明了使分析有用的各种结果。第三,本例描述了结果的统计处理。我希望这三点能够推动当前复杂适应性组织仿真分析的实践。
{"title":"Simulation analysis on destabilization of complex adaptive organizations","authors":"Il-Chul Moon","doi":"10.1109/CISDA.2009.5356520","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356520","url":null,"abstract":"Many adversarial organizations, such as organized crime groups, terrorist networks, and the like, are complex adaptive organizations. Therefore, strategies against them should consider the natures of complexity and adaptivity. However, such natures create nonlinear effects that are difficult to predict. To mitigate those difficulties, I utilize agent-based simulations that could possibly capture unexpected responses coming from our interventions into their organizations. This paper presents a simulation analysis example of an action against a terrorist group. Particularly, this example points out three critical aspects of simulation analysis. First, this simulation example shows how to setup a simulation analysis to anticipate an intervention's results. Second, this example illustrates various results making analysis useful. Third, this example describes statistical processing of the results. I expect that the three points will advance the current practices of simulation analysis on complex adaptive organizations.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"19 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88649117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1